A) Ransomware
B) Screen scraper
C) Bot
D) Zero-day exploit
Correct Answer
verified
Multiple Choice
A) Malicious software that hides into the lower levels of the operating system and opens a backdoor
B) Malicious software that records every key stroke and mouse movement
C) Malicious software that disguises itself as a legitimate program
D) Malicious software that takes the computer data hostage to extort money
Correct Answer
verified
Multiple Choice
A) The process of copying data to another drive weekly
B) The process of copying data to a second location that is available for immediate use
C) The process of copying and storing data that could be restored to its original location
D) The process of copying data to the cloud
Correct Answer
verified
Multiple Choice
A) Trend analysis
B) Signature analysis
C) Correlation analysis
D) Sequencing analysis
Correct Answer
verified
Multiple Choice
A) Change control
B) NIST framework
C) Standard operating procedure
D) Patch management
Correct Answer
verified
Multiple Choice
A) Ransomware
B) Screen scraper
C) Zero-day exploit
D) Bot
Correct Answer
verified
Multiple Choice
A) EternalBlue
B) SpyEye
C) Slammer
D) Zeus
Correct Answer
verified
Multiple Choice
A) Antivirus software is 100 percent effective against malware intrusions.
B) Antivirus software uses signature-based recognition and behavior-based recognition to detect malware.
C) Antivirus software can detect various types of malware.
D) Antivirus software can detect, contain, or eliminate malware.
Correct Answer
verified
Multiple Choice
A) Hierarchical
B) Simple step
C) Graphical
D) Flowchart
Correct Answer
verified
Multiple Choice
A) Backups can be stored in the cloud.
B) Backups can be conducted once a week.
C) Backups do not have to be restored as long as they are stored in the cloud.
D) Backups can be stored to a tape.
Correct Answer
verified
Multiple Choice
A) A virus is malicious software that requires a host file to spread itself, whereas a worm is malicious software that does not require a host file to spread itself.
B) A worm is malicious software that requires a host file to spread itself, whereas a virus is malicious software that does not require a host file to spread itself.
C) A virus is malicious software that attaches itself to executable files, whereas a worm is malicious software that attaches itself to an image file.
D) There is no difference between a virus and a worm.
Correct Answer
verified
Multiple Choice
A) Sequencing
B) Due care
C) Trend analysis
D) Due diligence
Correct Answer
verified
Multiple Choice
A) Trojans reproduce by infecting other files.
B) Trojans need user interaction to spread.
C) Trojans self-replicate.
D) Trojans are legitimate programs that enhance user experience.
Correct Answer
verified
Multiple Choice
A) SpyEye
B) WannaCry
C) Sapphire
D) Slammer
Correct Answer
verified
Multiple Choice
A) HIPAA
B) GLBA
C) PCI DSS
D) FISMA
Correct Answer
verified
Multiple Choice
A) Zeus
B) SpyEye
C) Slammer
D) Nyetya
Correct Answer
verified
Multiple Choice
A) Real-time firewall detection of suspicious file downloads
B) Review and analysis of log files
C) User awareness to recognize and report suspicious activity
D) Not allowing users to have administrative rights to their workstations
Correct Answer
verified
Multiple Choice
A) Compares log data to known bad activity
B) Compares log data to known good activity
C) Identifies activity over time that in isolation might appear normal
D) Ties individual entries together based on related information
Correct Answer
verified
Multiple Choice
A) Hyperlink
B) Log
C) Relay
D) Metadata
Correct Answer
verified
Showing 1 - 19 of 19
Related Exams